ID

VAR-201503-0329


CVE

CVE-2014-7897


TITLE

HP Point of Sale PCs Running Windows With OPOS Drivers Arbitrary Code Execution Vulnerability

Trust: 0.9

sources: BID: 72969 // CNNVD: CNNVD-201503-194

DESCRIPTION

The OLE Point of Sale (OPOS) drivers before 1.13.003 on HP Point of Sale Windows PCs allow remote attackers to execute arbitrary code via vectors involving OPOSScanner.ocx for Imaging Barcode scanners, Linear Barcode scanners, Presentation Barcode scanners, Retail Integrated Barcode scanners, Wireless Barcode scanners, and 2D Value Wireless scanners. HP Point of Sale PCs running Windows with OPOS Drivers are prone to multiple arbitrary code-execution vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. HP Point of Sale PCs running OPOS drivers prior to 1.13.003 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04583185 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04583185 Version: 2 HPSBHF03279 rev.2 - HP Point of Sale PCs Running Windows with OPOS Drivers, Remote Execution of Code NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. These vulnerabilities could be remotely exploited resulting in execution of code. References: CVE-2014-7888 (ZDI-CAN-2512, SSRT101696) CVE-2014-7889 (ZDI-CAN-2511, SSRT101695) CVE-2014-7890 (ZDI-CAN-2510, SSRT101694) CVE-2014-7891 (ZDI-CAN-2509, SSRT101693) CVE-2014-7892 (ZDI-CAN-2508, SSRT101692) CVE-2014-7893 (ZDI-CAN-2507, SSRT101691) CVE-2014-7894 (ZDI-CAN-2506, SSRT101690) CVE-2014-7895 (ZDI-CAN-2505, SSRT101689) CVE-2014-7897 (SSRT101689) CVE-2014-7898 (SSRT101689) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The package contains update common control objects for all of the impacted products in the table below. Download the SP70564 from the Support and Drivers site for the impacted product. Go to http://www.hp.com : Chose Support then Download Drivers Enter in your POS system name, such as product name HP rp5800 Retail System then click on Go. Choose the Appropriate OS after selecting the link for the appropriate product. The latest drivers will be in the Software - POS section. Download the OPOS Common Control Objects v1.13.003 Softpaq. HP Product Description Prod Num CVE Number, Impacted Driver Monitors HP Retail RP7 VFD Customer Display QZ701AA / AT CVE-2014-7889 OPOSLineDisplay.ocx HP Retail Integrated 2x20 Display G6U79AA / AT CVE-2014-7889 OPOSLineDisplay.ocx HP Retail Integrated 2x20 Complex G7G29AA / AT CVE-2014-7889 OPOSLineDisplay.ocx Printers HP PUSB Thermal Receipt Printer ALL FK224AA / AT CVE-2014-7895 OPOSCashDrawer.ocx CVE-2014-7894 OPOSPOSPrinter.ocx CVE-2014-7888 OPOSMICR.ocx CVE-2014-7893 OPOSCheckScanner.ocx HP SerialUSB Thermal Receipt Printer BM476AA / AT CVE-2014-7895 OPOSCashDrawer.ocx CVE-2014-7894 OPOSPOSPrinter.ocx CVE-2014-7888 OPOSMICR.ocx CVE-2014-7893 OPOSCheckScanner.ocx HP Hybrid POS Printer with MICR US FK184AA / AT CVE-2014-7895 OPOSCashDrawer.ocx CVE-2014-7894 OPOSPOSPrinter.ocx CVE-2014-7888 OPOSMICR.ocx CVE-2014-7893 OPOSCheckScanner.ocx HP Value PUSB Receipt Printer F7M67AA / AT CVE-2014-7895 OPOSCashDrawer.ocx CVE-2014-7894 OPOSPOSPrinter.ocx CVE-2014-7888 OPOSMICR.ocx CVE-2014-7893 OPOSCheckScanner.ocx HP Value Serial/USB Receipt Printer ALL F7M66AA / AT CVE-2014-7895 OPOSCashDrawer.ocx CVE-2014-7894 OPOSPOSPrinter.ocx CVE-2014-7888 OPOSMICR.ocx CVE-2014-7893 OPOSCheckScanner.ocx Cash Drawers HP USB Standard Duty Cash Drawer E8E45AA / AT CVE-2014-7895 OPOSCashDrawer.ocx MSR HP Mini MSR FK186AA / AT CVE-2014-7892 OPOSMSR.ocx HP Retail Integrated Dual-Head MSR QZ673AA / AT CVE-2014-7892 OPOSMSR.ocx HP Integrated Single Head MSR w/o SRED J1A33AA / AT CVE-2014-7892 OPOSMSR.ocx HP Integrated Single Head w/o MSR SRED J1A34AA / AT CVE-2014-7892 OPOSMSR.ocx HP RP7 Single Head MSR w/o SRED K1K15AA/AT CVE-2014-7892 OPOSMSR.ocx Keyboards HP POS Keyboard FK221AA / AT CVE-2014-7891 OPOSPOSKeyboard.ocx CVE-2014-7892 OPOSMSR.ocx CVE-2014-7890 OPOSToneIndicator.ocx HP POS Keyboard with MSR FK218AA / AT CVE-2014-7891 OPOSPOSKeyboard.ocx CVE-2014-7892 OPOSMSR.ocx CVE-2014-7890 OPOSToneIndicator.ocx Pole Displays POS Pole Display FK225AA / AT CVE-2014-7889 OPOSLineDisplay.ocx HP Graphical POS Pole Display QZ704AA / AT CVE-2014-7889 OPOSLineDisplay.ocx HP LCD Pole Display F7A93AA / AT CVE-2014-7889 OPOSLineDisplay.ocx Scanners HP Imaging Barcode Scanner BW868AA / AT CVE-2014-7897 OPOSScanner.ocx HP Linear Barcode Scanner QY405AA / AT CVE-2014-7897 OPOSScanner.ocx HP Presentation Barcode Scanner QY439AA / AT CVE-2014-7897 OPOSScanner.ocx HP Retail Integrated Barcode Scanner E1L07AA / AT CVE-2014-7897 OPOSScanner.ocx HP Wireless Barcode Scanner E6P34AA / AT CVE-2014-7897 OPOSScanner.ocx HP 2D Value Wireless Scanner K3L28AA CVE-2014-7897 OPOSScanner.ocx HISTORY Version:1 (rev.1) - 4 March 2015 Initial release Version:2 (rev.2) - 20 March 2015 Corrected and clarified download instructions Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iEYEARECAAYFAlUMUjIACgkQ4B86/C0qfVkuCwCcC+h95jOOyvg4mWsqhdPSXYbV 9wEAniU7Opjr4sXaxMR+P0nqd3A6n+Zu =CQuO -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2014-7897 // JVNDB: JVNDB-2014-007970 // BID: 72969 // VULHUB: VHN-75842 // PACKETSTORM: 130986 // PACKETSTORM: 130706

AFFECTED PRODUCTS

vendor:hpmodel:ole point of sale driverscope:lteversion:1.13.001

Trust: 1.0

vendor:hewlett packardmodel:hp 2d value wireless scannerscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp imaging barcode scannerscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp linear barcode scannerscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp opos driverscope:ltversion:1.13.003 (hp point of sale windows pc)

Trust: 0.8

vendor:hewlett packardmodel:hp presentation barcode scannerscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp retail integrated barcode scannerscope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp wireless barcode scannerscope: - version: -

Trust: 0.8

vendor:hpmodel:ole point of sale driverscope:eqversion:1.13.001

Trust: 0.6

sources: JVNDB: JVNDB-2014-007970 // CNNVD: CNNVD-201503-194 // NVD: CVE-2014-7897

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-7897
value: HIGH

Trust: 1.0

NVD: CVE-2014-7897
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201503-194
value: CRITICAL

Trust: 0.6

VULHUB: VHN-75842
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-7897
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-75842
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-75842 // JVNDB: JVNDB-2014-007970 // CNNVD: CNNVD-201503-194 // NVD: CVE-2014-7897

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2014-7897

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-194

TYPE

Unknown

Trust: 0.3

sources: BID: 72969

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-007970

PATCH

title:HPSBHF03279 SSRT101689url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04583185

Trust: 0.8

sources: JVNDB: JVNDB-2014-007970

EXTERNAL IDS

db:NVDid:CVE-2014-7897

Trust: 3.0

db:SECTRACKid:1031840

Trust: 1.7

db:JVNDBid:JVNDB-2014-007970

Trust: 0.8

db:CNNVDid:CNNVD-201503-194

Trust: 0.7

db:BIDid:72969

Trust: 0.3

db:VULHUBid:VHN-75842

Trust: 0.1

db:PACKETSTORMid:130986

Trust: 0.1

db:PACKETSTORMid:130706

Trust: 0.1

sources: VULHUB: VHN-75842 // BID: 72969 // JVNDB: JVNDB-2014-007970 // PACKETSTORM: 130986 // PACKETSTORM: 130706 // CNNVD: CNNVD-201503-194 // NVD: CVE-2014-7897

REFERENCES

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04583185

Trust: 1.7

url:http://www.securitytracker.com/id/1031840

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7897

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7897

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2014-7894

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7897

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7890

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7891

Trust: 0.2

url:http://www.hp.com

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7895

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7893

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7889

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7898

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7892

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2014-7888

Trust: 0.2

sources: VULHUB: VHN-75842 // JVNDB: JVNDB-2014-007970 // PACKETSTORM: 130986 // PACKETSTORM: 130706 // CNNVD: CNNVD-201503-194 // NVD: CVE-2014-7897

CREDITS

HP and Ariele Caltabiano.

Trust: 0.3

sources: BID: 72969

SOURCES

db:VULHUBid:VHN-75842
db:BIDid:72969
db:JVNDBid:JVNDB-2014-007970
db:PACKETSTORMid:130986
db:PACKETSTORMid:130706
db:CNNVDid:CNNVD-201503-194
db:NVDid:CVE-2014-7897

LAST UPDATE DATE

2025-04-12T23:13:08.518000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-75842date:2019-10-09T00:00:00
db:BIDid:72969date:2015-03-04T00:00:00
db:JVNDBid:JVNDB-2014-007970date:2015-03-11T00:00:00
db:CNNVDid:CNNVD-201503-194date:2019-10-17T00:00:00
db:NVDid:CVE-2014-7897date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-75842date:2015-03-09T00:00:00
db:BIDid:72969date:2015-03-04T00:00:00
db:JVNDBid:JVNDB-2014-007970date:2015-03-11T00:00:00
db:PACKETSTORMid:130986date:2015-03-24T17:03:44
db:PACKETSTORMid:130706date:2015-03-09T20:17:05
db:CNNVDid:CNNVD-201503-194date:2015-03-10T00:00:00
db:NVDid:CVE-2014-7897date:2015-03-09T17:59:08.500